TMCnet News

The P-persistent CSMA Protocol with Monitoring Function in WSN and the Analysis of the Protocol [Sensors & Transducers (Canada)]
[April 22, 2014]

The P-persistent CSMA Protocol with Monitoring Function in WSN and the Analysis of the Protocol [Sensors & Transducers (Canada)]


(Sensors & Transducers (Canada) Via Acquire Media NewsEdge) Abstract: This paper presents a new p-persistent CSMA wireless sensor network MAC protocol with monitoring function based on random multiple access system, and gets the mathematical expressions of system throughput, system average operating power and the life cycle of terminal nodes of p-persistent CSMA wireless sensor network MAC protocol with monitoring function through complicated mathematical modeling, rigorous mathematical derivation and using average period analysis. The computer simulation results not only confirm the correctness of the theoretical analysis but also show that the p-persistent CSMA with monitoring for WSNs MAC protocol due to join the monitoring signals, resulting in the decrease of systemic throughput, but reduce the collision probability. Meanwhile, the p-persistent CSMA wireless sensor network MAC protocol with monitoring function this paper presents can effectively reduce energy consumption. Copyright © 2013 IFSA.



Keywords: Random multiple access system, Throughput, Average operating power, Life cycle, Monitoring function, and Average period analysis.

(ProQuest: ... denotes formulae omitted.) 1. Introduction Wireless sensor network [1, 2] is composed of a large number of tiny nodes distributed randomly, which integrate with sensor, data processing unit and communication module, the nodes make up a network themselves, and is distribution system which is large, unattended and resources restrict limited, with self-organization, autonomy and adaptive dynamic characteristics [3, 4], and has a large applications in military, medical, explosion and many other fields. The new research direction of wireless sensor network protocol is to reduce the collision rate of information packets, improve the throughput and reduce the energy consumption, so to solve the problems such as the carry limited energy of the sensor terminal nodes, the difficult to supply or replace battery.


The paper presents a new Wireless sensor network MAC protocol [8-10], p-persistent CSMA control protocol with monitoring function based on random multiple access system [5-7]. By adding a monitoring signal ACK behind the system delay to increase the controllability of the system, reduce the collision probability and improve the channel utilization. We get some important system parameter such as the throughput, average power and life cycle of nodes by using the average cycle analysis method [5-7] on the bases of the increasing controllability. Computer simulation results verify the correctness of the theory.

2. P-persistent CSMA Protocol with Monitoring Function The model of p-persistent CSMA wireless sensor network MAC protocol with monitoring function this paper presents is shown in Fig. 1. In the wireless communication system using p-persistent CSMA protocol with monitoring function, the first thing when a terminal user wants to send information packets is to listen to the channel state. The user will send the information packets with probability p and give up sending with probability (1-p) if the channel is idle; but if the channel is busy, the user listen to the channel persistently until the channel is idle, then the user will send the information packets in the next slot with probability p, and give up transmitting with probability (1-p). Thus, the number of packets accumulated in the end of a TP equals to the number of packets listened continuously within (l+3a), if it is greater than or equal to 1, the next TP is still busy period, but if it is 0, then the busy period end.

The channel is divided into the following three events [12] based on the situation of the information packet transmission in the channel.

1) The event that information packet sent successfully (U); 2) The event that information packet conflict in the channel (B); 3) The event that the channel is idle, that is there is no packets in the channel (I).

From the Fig. 1, the successful event U, collision event B and idle event I can be grouped into two categories in nature, one is the idle event I, the other is the busy event BU, and these two events alternating cycles occur on the timeline, the time period is Tn.

2.1. Analysis of System Throughput 1. Before analyze the system performance, do the assumptions on the system as follows: 1) The channel is an idle channel without noise and interference; 2) The maximum transmission delay of the channel is a, and the TS length is also a, the information packet length is unit length 1, an integer multiple of a; 3) The time axis of the channel is divided by a, packets arrived within any a will be sent in the begin of next slot; 4) The time generated an acknowledge signal (monitoring signal) ACK is a, then the length of a transmission period TP is l+3a; 5) The channel access way is slotted p-persistent CSMA protocol, information packets arrived on the channel follows Poisson Distribution with independent parameter G; 6) The information packets needed to be sent in the first slot (delay a) of a TP can always detected the channel state at the last time; 7) The impacted packets will be resend in the following slots, and the re-transmitted information packet does not affect the process of the packets arriving in the channel.

2. According to the above control principle of the p-persistent CSMA protocol with monitoring function, we can get the following expressions.

The probability there are n information packets at time t in the channel is ... (1) The probability there are m information packets to be sent with probability p in which has n information packets arrive at time t is ... (2) The probability there is no packet in an idle slot is ... (3) The probability that has only one packet to transmit in an idle slot a is ... (4) The probability there are i idle events continuous in the channel is ... (5) The probability there is no packet in a TP is ... (6) The probability there is only one packet in a TP is ... (7) The probability there are j busy events BU continuous in the channel is ... (8) We can get the joint probability [11] of the p-persistent CSMA wireless sensor network MAC protocol with monitoring function is ... (9) The average timeslots of idle state based on the joint probability in a period is ... (10) The average timeslots of busy state in a period is ... (11) Defined as follows: U1 : There is only one packet to be sent with probability p among all the packets arrived at the last slot in the idle time, and the packet will be sent successfully in the next timeslot.

U2 : There is only one packet is sent with probability p among all the packets arrived in the busy time, and the packet will be sent successfully in the next slot.

Then we have ... (12) ... (13) The average number of timeslots that the packet transmitted successfully in a cycle time is ... (14) The average length of the successful packets in a cycle time is ... (15) The average length of the busy time in a cycle time is ... (16) The average length of the idle state in a cycle time is ... (17) From the definition of system throughput [13], we get the throughput of the p-persistent CSMA protocol with monitoring function is ... (18) From the literature [7], the throughput of traditional p-persistent CSMA protocol is ... (19) 2.2. The Efficiency Analysis of System Energy The p-persistent CSMA with monitoring for WSNs MAC protocol this paper presents can effectively reduce energy consumption. The control principle is shown in Fig. 2. The first thing when a terminal user wants to send information packets is to listen to the channel state. The user will send the information packets with probability p and give up with probability (1-p) if the channel is idle; but if the channel is busy, the user listen to the channel persistently until the channel is idle, then the user will send the information packets in the next slot with probability p, and give up transmitting with probability (1-p). Thus, the number of packets accumulated in the end of a TP equals to the number of packets listened continuously within (l+3a), if it is greater than or equal to 1, the next TP is still busy period, but if it is 0, then the busy period end and enter into sleep.

The efficiency analysis of the system this paper used is based on the battery model of literatures [15] [16], we make the following definitions: PT =\&mW refers to the power of service nodes which are in transmission; PR =2.5mW refers to the power of service nodes which are in accepting state; PD = 0.5m W refers to the power of the channel which is in detecting state; Assuming the leakage power of battery is 10 % of the total energy E (unit: Wh), then the discoverable power of the year is ... (20) If the node does not work, then the battery will run out in a decade, when the average power of the sensor node is Pn, then we can know the node's life cycle when the battery run out.

... (21) For the p-persistent CSMA control protocol with monitoring function, we have ... (22) Refer to the battery model, in a transmission period TP on the channel, we have 1) Energy consumption of transmitting.

For the busy time of the channel (BU), the number of the packets arrived in a TP (1+3 a) listen to the channel persistently and will be sent at the start time of the next TP when listen to the channel is idle is G(l + 3a).

For the idle period I, the average number of packets which will be sent in the first of the next TP is Gpa.

The energy consumption of sending in a Tn is ... (23) 2) Energy consumption of receiving.

The energy consumption of receiving in a Tn is ... (24) 3) Energy consumption of detecting.

For the compound event BU, the total duration that the nodes which needed to send information packets in a TP detecting the channel is ... (25) The number of TP in the busy time is ... (26) So, the total detecting duration of all the service nodes in the channel is ... (27) The energy consumption of detecting in a Tn is ... (28) The average operating power of the channel is ... (29) The life cycle of the node is ... (30) 3. The Computer Simulation Experiment and Result Analysis The simulation [14] of the p-persistent CSMA wireless sensor network MAC protocol with monitoring function is based on the previous analysis. And we use the Matlab to simulate, and compare the simulation results with the theoretical results.

From the foregoing figures, we can have the following results: 1) In the Fig. 3, we can see that the p-persistent CSMA wireless sensor network MAC protocol with monitoring function has a lower throughput than the single the p-persistent CSMA wireless sensor network MAC protocol. This is because when the system function is increased, such as increasing the monitoring function, the system needs to keep stability by reducing the throughput.

2) Fig. 4 is the comparison of the theoretical value and the simulation value for the p-persistent CSMA wireless sensor network MAC protocol with monitoring function when a = 0.1 and p = 0.1. As can been seen from the figure, the theoretical values is well agree with the simulation values so that proved the correctness of the theoretical analysis. And under the control of the protocol, the system has a higher throughput and utilization rate in the light load, avoiding the waste of channel resources. But when the system load increases, the system throughput will decrease with the creasing of the collision probability. This is because the number of arrived packets increases when the load increase, then the number of the packets will be sent in the next slot will also increase, thus, the packets will conflict in the channel as a result of the number of packets want to be sent in the channel increases, then the system throughput will on the decline.

3) Fig. 5 shows the change of the throughput S over the arriving rate G with different system delay a when p = 0.1 .The smaller system delay, the greater system throughput in the same arriving rate, the reason is that when system delay is small, the number of packets which can know the channel is in idle state in a transmission delay is relatively small, then the number of packets decide to be transmitted in the next slot is also reduced, which also reduce the collision probability of information packets, the system throughput will rise. That is to say, the increase of system loads has a little effect on the system throughput when system delay has a smaller value.

4) Fig. 6 shows the comparison of the throughput when using different transmission probability and system delay a = 0.1. As can be seen from the figure, the increasing of transmission probability p will lead to a decline in the overall system throughput, because when the transmission probability increases, the number of packets want to be transmitted when the channel is idle increases, which also makes the information packet collision increases, resulting in the decrease of throughput.

4. Conclusions The paper presents a new p-persistent CSMA wireless sensor network MAC protocol with monitoring function based on random multiple access system, and gets the mathematical expressions of system throughput, system average operating power and the life cycle of terminal nodes of p-persistent CSMA wireless sensor network MAC protocol with monitoring function through a complicated mathematical modelling and rigorous mathematical derivation. The computer simulation results not only confirm the correctness of the theoretical analysis but also show that the p-persistent CSMA with monitoring for WSNs MAC protocol due to join the monitoring signals, resulting in the decrease of systemic throughput, but reduces the collision probability. Meanwhile, the p-persistent CSMA wireless sensor network MAC protocol with monitoring function this paper presents can effectively reduce energy consumption.

Acknowledgements This work was supported by the National Natural Science Foundation of China (61072079); Natural Science Foundation of Yunnan Province (2010CD023); Graduate Scientific Research Fund of Yunnan University (ynuy201047).Thanks for the seriously guidance of Professor Dongfeng Zhao.

References [1]. K. Pister, B. Hohlt, J. Jeong, L. Doherty, J. P. Vainio, A sensor network infrastructure [EB/OL], http://www-base.eecs.berkeley.edu/projects/ivy, 2003.

[2] . X. Zhang, The Study on Wireless Sensor Network, Jiangnan University, 2009.

[3] . H. Yu, P. Zeng, W. Liang, Wireless Sensor Network Intelligent System, Science Press, Beijing, 2006.

[4] . F. Ren, H. Huang, C. Lin, Wireless Sensor Network, Journal of Software, Vol. 14, Issue 2, 2003, pp.1282-1291.

[5] . Z. Dongfeng, Study on A New Method for Continuous-time Systems of Random Access Channel, Journal of Electronics, Vol. 21, Issue 1, 1999, pp. 37-41.

[6] . Z. Dongfeng, L. Bihai, Z. Sumin, Study on a New Method for the Slotted Access Channel, Journal of Electronics, Vol. 19, Issue 6, 1997, pp. 814-819.

[7] . L. Pingyuan, H. Guoshen, L. Zuxin, Communication Model of Random Multiple Address System With Multiple Channels, Journal of Jishou University (Natural Science Edition), Vol. 24, Issue 2, 2003, pp.79-82.

[8] . L. Huijuan, H. Ying, W. Haiyan, A Study on MAC Protocol for Wireless Sensor Networks, Journal of Shangqiu teachers College, Vol. 26, Issue 3, 2010, pp. 77- 79.

[9] . L. Jiaohua, L. Duren, Z. Ying, The Performance Analysis of MAC Protocol for Wireless Sensor Networks, Technology Platform, Vol. 9, 2009, pp.77-81.

[10] . H. Wang, Y. Qu, Q. Kuang, The Probability of Ruin in a Markovian Environment, International Journal of Applied Mathematics and Statistics, Vol. 28, 2012, pp.12-17.

[11] . Z. Dongfeng, Study on the Average Cycle Method for Slotted Multiple-Access Communications, Journal of China Institute of Communications, Vol. 20, Issue 8,1999, pp. 80-85.

[12] . Z. Dongfeng, Study on Analysis Method for Random Access Protocol, Journal of Electronics, Vol. 16, Issue 1, 1999, pp. 44-49.

[13] . M. Hong, H. Liu, The Modelling and Simulation of Order Processing System based on Queuing Theory, International Journal of Applied Mathematics and Statistics, Vol. 40,2013, pp. 223-231.

[14] . A. El-Hoildi, J. Decotignie, J. Hernandez, Low Power MAC Protocols for Infrastructure Wireless Sensor Networks, In Proceedings of European Wireless (EW'04), Barcelona, Spain, 2004, pp. 563-569.

[15] . A. El-Hoiydi, J. D. Decotignie, WiseMAC: An Ultra Low Power MAC Protocol for the Downlinkofrastructure Wireless Sensor Networks, in Proceedings of the 9th Int'l Symp. on Computers and Communications, Alexandria, Egypt, 2004.

1 Yingying GUO,2 Hongwei DING,3 Jing NAN, 4 Yifan ZHAO,5 Qianlin LIU 1,3,4 School of Information, Yunnan University, No.2 Green Lake North Road, Kunming, Yunnan, 650091, China 2 Department of Communication Engineering, Yunnan University, No.2 Green Lake North Road, Kunming, Yunnan, 650091, China 5 Yunnan Provincial Military Command, Kunming, Yunnan, 650000, China 1 Tel:+8615887221310 1 E-mail: [email protected] Received: 18 September 2013 /Accepted: 22 November 2013 /Published: 30 December 2013 (c) 2013 International Frequency Sensor Association

[ Back To TMCnet.com's Homepage ]